Skip to content

TechRepublic

Trending Now

User holds a smartphone displaying Qualcomm's logo
Credit: Adobe
Article

Qualcomm announces two major RFFE developments

the relationship between VPNs, computers, and the network with encrypted connections
Image: Funtap/Adobe Stock
Article

Get one year of this leading VPN for just $30

Businessman holds the model of business, made from wood blocks. Alternative risk concept, business plan and business strategy. Insurance concept.
Image: Michail Petrov/Adobe Stock
Article

Managing the element of risk in projects

Ransomware infects a computer's system.
Credit: Adobe
Article

How traditional security tools fail to protect companies against ransomware

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Security

Five Apps: Encrypt your emails for free

By Jack Wallen October 30, 2013, 12:18 PM PDT

Image
1
of 10
Previous Next

6_secure_email_iStock.jpg
6_secure_email_iStock.jpg
Five Apps: Encrypt your emails for free

Five free apps for encrypting email

Five free apps for encrypting email

This gallery is also available as a TechRepublic article.

There are those that claim encryption is dead. Not so, saysrnmany small and medium sized businesses across the globe. There are plenty ofrnreasons why you might need to encrypt an outgoing email u2013 just as many reasonsrnas there are ways. Whether you are using an email client or a web-based emailrnsolution, you can encrypt your email. I have searched for some of the easierrn(and free) means to successfully get those outgoing emails wrapped in a warmrnblanket of secrecy.

rnrn

With the exception of one, these tools serve a singularrnpurpose – to encrypt email messages. Each of them offers a fairlyrnstraight-forward learning curve that anyone should be able to get up to speedrnwith quickly. That said, let’s dive in and see what each of these tools can dornfor your encryption needs.

a1_enigmail_1.png
a1_enigmail_1.png
Five Apps: Encrypt your emails for free

Enigmail 1

Enigmail 1

Five Apps

rnrn

1. Enigmail

rnrnEnigmailrnis a Thunderbird extension that works in conjunction with GnuPG to encrypt email. This extensionrnrequires both Thunderbird and GnuPG to be installed on the machine in order forrnit to function. This extension works with Thunderbird versions 17-27 on bothrnWindows and Linux. Enigmail also features support for in-line PGP, per-identityrnencryption rules, automatic encrypt/sign, integrated OpenPGP PhotoID viewer,rnOpenPGP key retrieval via proxy servers, and much more. Enigmail is availablernfor Windows, Linux, Mac, BSD, and OS/2.

b1_mailvelope_1.png
b1_mailvelope_1.png
Five Apps: Encrypt your emails for free

Mailvelope 1

Mailvelope 1

2. Mailvelope

rnrn

Mailvelope is anrnextension for Chrome and Firefox that seamlessly integrates with Gmail, YahoornMail, Outlook.com, and GMX. With Mailvelope you can generate the necessary keysrn(which are stored on your local machine) and import other users keys. Thisrnextension works from within your web-mail client when you go to compose anrnemail. In the email composition window a small button will appear (in Gmailrnit’s in the upper right corner of the text area of the compose window) that yourncan click to encrypt the email. By default all outgoing email are allrnunencrypted, so you have to manually select to encrypt. For anyone who dependsrnupon web mail, this is one of the best solutions for mail encryption.

b2_mailvelope_2.png
b2_mailvelope_2.png
Five Apps: Encrypt your emails for free

Mailvelope 2

Credit: Images by Jack Wallen for TechRepublic

Mailvelope 2

Credit: Images by Jack Wallen for TechRepublic
c1_infoencrypt_2.png
c1_infoencrypt_2.png
Five Apps: Encrypt your emails for free

Infoencrypt 1

Infoencrypt 1

3. Infoencrypt

rnrnInfoencrypt isrnprobably one of the easiest means to encrypt a one-off email. All you need torndo is visit the site, type the email to be encrypted, type a password (andrnverify the password), and click Encrypt. The site will encrypt the email andrnpost the encrypted text so you can then copy and past it into an email to berndelivered to a recipient. Once the recipient gets the email, they go back tornthe site, paste the text into the window, enter the password you used tornencrypt the email, and click Decrypt. Your email will be quickly decrypted forrnthe recipient to read. It’s that simple. Although not for the most ardent ofrnsecurity fanatics, Infoencrypt will work just fine for those needing simplisticrnemail encryption.

c2_infocrypt_1.png
c2_infocrypt_1.png
Five Apps: Encrypt your emails for free

Infoencrypt 2

Credit: Images by Jack Wallen for TechRepublic

Infoencrypt 2

Credit: Images by Jack Wallen for TechRepublic
d1_mymail_crypt_1.png
d1_mymail_crypt_1.png
Five Apps: Encrypt your emails for free

Mymain Crypt for Gmail 1

Mymain Crypt for Gmail 1

4. Mymain Crypt for Gmail

rnrnMymailrnCrypt for Gmail is a Gmail-specific extension for Google Chrome that makesrnencrypting your Gmail as easy as a few mouse clicks. Once you’ve installed thernextension all you have to do is go to the Mymail Crypt options (from with thernChrome Extensions window), generate your key, import your friend’s keys, andrnthen open up Gmail. From within the Gmail compose window you will find threernnew buttons (bottom right corner): Encrypt and Sign, Encrypt, Sign. With thosernbuttons you’ve got all the encrypting power you need for Gmail. Mymail Crypt isrnmy favorite encryption tool for Gmail.

d2_mymail_crypt_2.png
d2_mymail_crypt_2.png
Five Apps: Encrypt your emails for free

Mymain Crypt for Gmail 2

Credit: Images by Jack Wallen for TechRepublic

Mymain Crypt for Gmail 2

Credit: Images by Jack Wallen for TechRepublic
e1_gpg4win_1.png
e1_gpg4win_1.png
Five Apps: Encrypt your emails for free

Gpg4Win 1

Gpg4Win 1

5. Gpg4Win

rnrnGpg4Win doesn’trnactually handle the encryption of email, but if you’re going to use anrnencryption plugin for Thunderbird (or any other email client besides Outlook),rnthis application is a must-install. Gpg4Win not only can generate keys for you,rnbut also help you encrypt files. The installation of this software will installrnboth the GPG system as well as Kleopatra, an easy to use GPG certificaternmanager. From Kleopatra, you will generate your own keys as well as import keysrnfrom others. With Gpg4Win installed, you will find tools like Enigmail not onlyrnpossible on Windows, but far easier to use.

e2_gpg4win_2.png
e2_gpg4win_2.png
Five Apps: Encrypt your emails for free

Gpg4Win 2

Credit: Images by Jack Wallen for TechRepublic

Gpg4Win 2

Bottom line

rnrnIf you’re looking to get quick and easy email encryptionrnup and running, you cannot go wrong with any of the above tools. Not only arernthey free, they are far easier than trying to get encryption working withrnOutlook and they won’t bog you down with having to purchase and installrncertificates. Give one of these a try and see if it doesn’t meet your emailrnencryption needs.

Credit: Images by Jack Wallen for TechRepublic
  • Security
  • Account Information

    Share with Your Friends

    Five Apps: Encrypt your emails for free

    Your email has been sent

Share: Five Apps: Encrypt your emails for free
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice